Why conventional malware threatens industrial environments
There have been some stories about the kind of network air-gapping ordinary…
How to avoid turning your smartphone into a spyware zoo
Sometimes even a completely innocent-looking site with a good reputation can be…
Roaming Mantis infects smartphones through Wi-Fi routers
Some time ago our experts investigated a piece of malware that they…
What happened to the Internet: attack on Cisco switches
Let’s say that your internet connection suddenly went down or, perhaps, you…
SynAck ransomware: The doppelgängster
Malware tends to evolve, with crooks adding new functions and techniques to…
Modern yacht hacking
Manufacturers of modern vessels didn’t escape the common trend of connecting various…
In defense of the IoT: First-hand experience
Have you ever noticed how often the phrase “I’ve got a bad…
Hidden miners on Google Play
When a computer shows signs of slowing down, many tend to blame…
Go to a porn site, get a virus — right?
Possibly the most common advice for avoiding computer viruses is to avoid…
Cryptocurrency miners in Youtube ads
More often than not, people knowingly install miners on their computers in…